Safety vulnerability ID: 71951
The information on this page was manually curated by our Cybersecurity Intelligence Team.
A race condition vulnerability exists in zenml-io/zenml affected versions, which allows for the creation of multiple users with the same username when requests are sent in parallel. The vulnerability arises due to insufficient handling of concurrent user creation requests, leading to data inconsistencies and potential authentication problems. Specifically, concurrent processes may overwrite or corrupt user data, complicating user identification and posing security risks. This issue is particularly concerning for APIs that rely on usernames as input parameters, such as PUT /api/v1/users/test_race, which could lead to further complications.
Latest version: 0.70.0
ZenML: Write production-ready ML code.
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application